Is there a way to confirm that my home server’s security is sufficient for most common attacks?

Externally, I only have the ports 80, 443 (Nginx-Proxy-Manager) and 51829 (Wireguard VPN) enabled on the router.

I have a Rpi4 and a mini PC connected to the router via ethernet cable. And I am using NPM for reverse proxy. Also enabled SSL for local DNS so I don’t have to keep typing the IP addresses for each server.

All my apps are docker containers and they all use network_mode: bridge.

And finally, I have only two services open to internet. The media server and the Wireguard VPN. Got the free DuckDNS domains and configured in the NPM.

I haven’t done any specific firewalls. Just using default Debian 12 settings and default Docker engine settings.

  • PassiveLemon@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Sounds very similar to my setup. All I would recommend is SSH through keys (and disable root login) and don’t put everything into the Docker network bridge. If you have containers that need a database or other container(s), make a network for those.

    Obviously keep up to date with new updates. There are many services that can automatically notify you for updates like Watchtower. You can also set it up automatically update the container but it’s not always recommended in case of breaking changes.

  • Anycast@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Minor security through obscurity thing you could implement: buy you own domain through cloudflare for ~$10/year. Use their proxy so that your public IP doesn’t resolve to your home public IP like it does now with DuckDNS. If you want to get fancy, you can also use their API with fail2ban to block connections after a predefined number of login failures.

  • Outrageous_Plant_526@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Go to public.cyber.mil and download the appropriate stigs for your stuff, review them, and apply the settings. Always a good start to improving the security.

  • Cybasura@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I recommend you dont touch network_mode unless you absolutely need it

    Most services shouldnt need the network_mode, just gotta port forward/translate most of the time

  • kindrudekid@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Audit-ssh and testssl.

    Audit ssh shows all the algorithm in use and setting and shows then colored format like red bad and so on…

    Same with testssl, which tls supported ? Https redirect ? What cipher suites etc … again all color coded.

    Both available via homebrew for Mac.

    If you use Mozilla recommended for ssh and ssl you should be fine

    • chaplin2@alien.topB
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Frankly these are useless. SSH is secure by default and will never support algorithms that could be possibly broken. Same for TLS 1.3

  • ithilelda@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    yes, there are professional third party cybersecurity auditors you can hire, but I doubt anyone here would ever need them.

    Please people, stop being paranoid about your security. close up all unnecessary ports, and that’s what you can do on your end. whatever else, if the service binding to an open port has security vulnerabilities you don’t know, the project team may very well be unaware of it either, and there’s nothing you could do.

    also, if you have multiple users using your service, then it’s their password strength that you should be worrying the most, not your infrastructure.

  • peekeend@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Check Wazuh and Greenbone, but it requires a high learning curve so have fun learning the basics